Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection

Authors: Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid | Published: 2018-07-22

Simultaneous Adversarial Training – Learn from Others Mistakes

Authors: Zukang Liao | Published: 2018-07-21 | Updated: 2018-09-10

Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

Authors: Andrew Ilyas, Logan Engstrom, Aleksander Madry | Published: 2018-07-20 | Updated: 2019-03-28

Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication

Authors: Jiliang Zhang, Haihan Su | Published: 2018-07-20 | Updated: 2018-10-18

Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior

Authors: Vineeth S. Bhaskara, Debanjan Bhattacharyya | Published: 2018-07-19 | Updated: 2018-07-30

Sequence to Logic with Copy and Cache

Authors: Javid Dadashkarimi, Sekhar Tatikonda | Published: 2018-07-19

Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding

Authors: Tong Chen, Wenjia Niu, Yingxiao Xiang, Xiaoxuan Bai, Jiqiang Liu, Zhen Han, Gang Li | Published: 2018-07-18

Motivating the Rules of the Game for Adversarial Example Research

Authors: Justin Gilmer, Ryan P. Adams, Ian Goodfellow, David Andersen, George E. Dahl | Published: 2018-07-18 | Updated: 2018-07-20

Efficient Deep Learning on Multi-Source Private Data

Authors: Nick Hynes, Raymond Cheng, Dawn Song | Published: 2018-07-17

Online Robust Policy Learning in the Presence of Unknown Adversaries

Authors: Aaron J. Havens, Zhanhong Jiang, Soumik Sarkar | Published: 2018-07-16